Table of Contents
- Introduction to Malware Analysis
- Static Analysis
- Dynamic Analysis
- Assembly Language and Disassembly Primer
- Disassembly Using IDA
- Debugging Malicious Binaries
- Malware Functionalities and Persistence
- Code Injection and Hooking
- Malware Obfuscation Techniques
- Hunting Malware Using Memory Forensics
- Detecting Advanced Malware Using Memory Forensics

